New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 20)
· Marcia's (QA2)
· Bill G's (CO8)
· Paul's (AR 5)
· Robin's (AR 1)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· Recommend Us
· RegChat
· Reviews
· Search (Topics)
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 492
Comments: 13
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image ntwrk: Feature Opinion: Network Security-Best Practices image
Networks

Opinion: Network Security-Best Practices







by Marcia J. Wilson, CCSP Staff Writer
March 9, 2004


"Reprinted from January 27, 2k3"

Advice by Marcia J. Wilson

Believe it or not, best practices in network security begin with a top-down policy. Policy begins with understanding what it is you need to protect and what it is you need to protect against. The levels of responsibility need to be understood, and that implies that security is everyone's job, as each employee understands how he or she contributes to the organization. Best practices in network security are more about the what and why of securing the organization's information assets than about the how.

The security policy is a formal definition of an organization's stance on security, meaning what is allowed and what is not allowed. IT executives and managers faced with a myriad of technology choices become quickly overwhelmed at the daunting task of securing the enterprise. It is possible to unmuddy the waters by starting with a three-step framework that will aid in establishing a "best practices" network security program: Prepare, organize and execute. Let's take a look at each piece of this framework in more depth.

STEP 1: Prepare

The preparation stage is three-pronged and involves creating policy statements, conducting a risk analysis and establishing a security team structure.

The policy statement
To create policy statements, the organization needs to assess what levels of security are appropriate and achievable by taking into consideration the organizational structure, individual roles and responsibilities, policies already in place, service level agreements between the IT department and other departments, and even corporate politics. For instance, is the CEO exempt from enforcement of a strict password policy? Is it OK for a manager to request access to an employee's e-mail? Should employees be restricted from accessing the Internet altogether or from accessing particular sites? Are system administrators outside the law?

Policy statements, in particular "Acceptable Use" statements, define users' roles and responsibilities and can be stated as general high-level statements that cover all network systems and data within the organization. The statements should include acceptable use of systems and data for all categories of users including the system administrator. The intent of this policy is to clearly define the purpose, providing guidelines and responsibilities. The policy should also identify specific actions that could be taken in response to a violation of security policy, including disciplinary action. Put it in print and post it on the walls.

Senior management should use either an internal HR or marketing department to make sure the word gets out to all employees. Some companies require the signature of every employee on a copy of the acceptable-use statement. Security awareness training, sometimes included in new-hire training, can include a review of the policy and employee signatures gathered at that point.

The risk analysis
Conducting a risk analysis is a way of baselining the organization's security posture. Many companies hire an outside network security audit firm to provide this. The purpose of a risk analysis is to identify points of entry to the network and possible means of attack from both an internal and external perspective. This requires identifying all network resources and assigning a risk level. For instance, if a core router or firewall was compromised, what would the risk level be? The next step in risk analysis is to identify who has access to those resources. There are users, power or privileged users, administrators, partners and others. This can be a painful process for some organizations depending upon what type of authentication and authorization methods are in place. Some risk analysis methods include running a password cracking utility on the network in privileged mode to uncover not so obvious privileges.

The security team
The security team needs to be a cross-functional team with participants from every operational area. The team is responsible for policy awareness and enforcement as well as being informed on the technical aspects of the security architecture. The team is also responsible for responding to security breaches and reporting to senior management. The security team should also be responsible for approving security changes, or alternatively, a security team member should sit on the change management team. Monitoring the security of the network, creating an incident response process that includes being part of the restoration team when a loss occurs -- they are all responsibilities of the security team.

STEP 2: Organize

Once armed with policy statements, a risk analysis and a security team, it is important to define individual information assets as either a resource or a domain. A resource is a particular computing platform, operating system, application, database or network device. A domain is a business function. The cross-functionality of the security team ensures that priorities can be quickly defined and levels of difficulty related to remediation understood. Breaking down the work into manageable chunks facilitates moving forward. Go after the high-risk categories first and move down the list.

STEP 3: Execute

Once prepared and organized, executing is not as overwhelming as you might think.

Remember that it is impossible to completely secure distributed systems. The goal is to create security awareness, minimize risk and maximize the use of technology.

Best practices in detail
There are several organizations and vendors that have published detailed guidelines for securing individual computing platforms. CERT Coordination Center at Carnegie Mellon University provides Security Improvement Modules that detail how to secure Unix, NT and other technologies. Cisco Systems Inc. provides detailed security white papers on securing its network devices. Microsoft provides endless patches and security briefs pertaining to its operating systems and applications. The SANS Institute provides a wealth of information on forming policy and securing systems, and provides comprehensive training programs. The point is that there are numerous resources, or rat holes, to explore. Understanding what and why before understanding how is critical to a successful implementation of network security best practices.

*Note: Some links to stories may no longer function or now require you to register to view.





by Marcia J. Wilson ComputerCops Staff Writer

Marcia J. Wilson holds the CISSP designation and is the founder and CEO of Wilson Secure LLC , a company focused on providing independent network security auditing and risk analysis. She can be reached at .

Posted on Tuesday, 09 March 2004 @ 10:00:00 EST by cj
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· PHP HomePage
· Microsoft
· HotScripts
· W3 Consortium
· More about Networks
· News by cj


Most read story about Networks:
D-Link DSL-300G/DSL-300G+ Default Password Vulnerability

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

Send to a Friend  Send to a Friend
image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register